CN102804196A - Computing device with graphical authentication interface - Google Patents

Computing device with graphical authentication interface Download PDF

Info

Publication number
CN102804196A
CN102804196A CN2010800365890A CN201080036589A CN102804196A CN 102804196 A CN102804196 A CN 102804196A CN 2010800365890 A CN2010800365890 A CN 2010800365890A CN 201080036589 A CN201080036589 A CN 201080036589A CN 102804196 A CN102804196 A CN 102804196A
Authority
CN
China
Prior art keywords
computing equipment
primary image
grid
pattern
assistant images
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2010800365890A
Other languages
Chinese (zh)
Other versions
CN102804196B (en
Inventor
马丁·里迪福德
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BlackBerry Ltd
Original Assignee
Research in Motion Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Research in Motion Ltd filed Critical Research in Motion Ltd
Publication of CN102804196A publication Critical patent/CN102804196A/en
Application granted granted Critical
Publication of CN102804196B publication Critical patent/CN102804196B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0484Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
    • G06F3/04842Selection of displayed objects or displayed text elements
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • G07C9/33Individual registration on entry or exit not involving the use of a pass in combination with an identity check by means of a password
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data

Abstract

A computing device with a graphical authentication interface in which the device displays a base image and authenticates a user when a pre-selected element in a secondary image overlying the base image is aligned with a pre-selected element in the base image.

Description

Computing equipment with pattern authentication interface
The cross reference of related application
The right of priority of the No.GB0912008.0 of patented claim formerly that the No.GB0910545.3 of patented claim formerly that the application requires to submit in Britain Department of Intellectual Property on June 18th, 2009 and on July 10th, 2009 submit in Britain Department of Intellectual Property, the full content of these two applications is incorporated into here by reference.
Technical field
The disclosure relates to the computing equipment with pattern authentication interface.
Background technology
Although most computing equipments (especially personal computing devices) have built-in password security, many people do not select to start troublesomely built-in password security.The people who starts built-in password security feels disappointed to it usually, and has the company system that changed password in every month usually.Each login needs different passwords ideally.It is very loaded down with trivial details remembeing all these passwords and selecting suitable one.
In the reality, can destroy the password system that is used for computing equipment in many ways, for example: repetition test (for example hitting random key) at random, wherein find correct password the most at last, just need the long period; The systematicness repetition test is for example for PIN number trial 0000,0001,0002 or the like; Have a mind to conjecture, for example attempt the number of general preference, for example 1066,1234 or the like, perhaps attempt personal number, for example birthday, telephone number or the like; Through keeping watch on, peep, find password of writing somewhere or the like behind, and know password; Assault, for example button is clicked measurement, online intercepting or the like; Compelled open to the robber.
4 PIN have 10 * 10 * 10 * 10/1=10,1/000th or 0.0001 theoretical security.Attempt if the hacker typically can only carry out 3 times to these probabilities, then the hacker possibly abandon.Yet; In fact problem is; It is found that to be difficult to remember a plurality of password/numbers, thus people select maybe be at other local widely used personal numbers of remembering, perhaps people need somewhere near the number of not remembering that (usually need the computing equipment of security) writes.Finally, exist the supervision swindle perhaps only when someone imports its PIN or password, to peep to know many report instances of password behind from it.Therefore, can think that the physical security (seeing from hacker or burglar's viewpoint) that the PIN number provides is in fact quite common.
Summary of the invention
Authenticated when a kind of computing equipment with pattern authentication interface, said equipment show primary image and element of selecting in advance in the assistant images that covers primary image and the element alignment of selecting in advance in the primary image in the pattern authentication interface.
Description of drawings
Fig. 1 shows according to unsuccessful pattern authentication of the present disclosure.
Fig. 2 shows according to successful pattern authentication of the present disclosure.
Fig. 3 shows the primary image according to pattern authentication of the present disclosure.
Fig. 4 shows according to disclosure focus in primary image and the circular authentication region that is associated during pattern authentication is set up.
Fig. 5 shows the selection according to the focus of the disclosure during pattern authentication is set up.
Fig. 6 shows the selection according to the element of the assistant images with digital form of the present disclosure.
Fig. 7 shows the affirmation screen that signal is set up according to success identity of the present disclosure.
Fig. 8 shows the primary image that is covered by assistant images according to of the present disclosure.
Fig. 9 shows according to the authentication through element in the assistant images and focus in the primary image are alignd and carry out of the present disclosure.
Figure 10 shows the screen of confirming success identity according to the disclosure.
Figure 11 shows the block diagram according to computing equipment of the present disclosure.
Embodiment
A kind of computing equipment with pattern authentication interface, wherein, said equipment shows primary image, the user is for authentication, with the element alignment of selecting in advance in element of selecting in advance that exists in the assistant images layer that covers primary image and the primary image.
This method is utilized our height visual acuity and memory.We can remember thousands of faces, hundreds of images and countless view.Even utilized the born ability of remembeing small visual details easily in this method just; In a realization, this method needs the user to remember to be familiar with the accurate point on the image, and can remember another visual element, and this element is alignd with this point.User experience is much better than the system of tradition based on PIN or password.In addition, this method is safer, especially spies on you to someone and uses this system to carry out the situation of authentication.In addition, the user can't write the part of hypograph or image to be seen by other people or to steal, and these are different with PIN code or password.
This method is described in realization with reference to being called Clixel.Clixel is based on the simple analog alignment task of carrying out on the Portable, personal computing equipment, this computing equipment have color/graphics and two dimensional cursor control perhaps (a) select position and (b) other modes of mobile image on the image.(in the future, this can carry out in the 3D virtual environment, therefore needs three D controllers, but current C lixel realizes using the control of 2D cursor).
The basic tomographic image of computing equipment screen display is fixed on static position usually.Although Clixel uses static primary image layer, the ability that moves the primary image layer can improve security.For example, when showing the primary image layer, computing equipment can be automatically carries out readjusting size and reorientating further to prevent copy slightly to the primary image layer at every turn.
This primary image layer is equivalent to the desktop background picture, possibly import from user's photograph album.As far as the user, individual picture more can be remembered than general sampling.Numerous and diverse, detailed picture performance is best; The software that on computing equipment, moves can be analyzed the numerous and diverse degree and the applicability scoring of picture.
When setting up verification process, the focus remembered in this primary image of ID (we are called " point of safes "), and use mouse or analog put pointer and click affirmation above that, on this layer, set up target.Operable other navigator comprise track pad, ISO point, trace ball, touch-screen, inclination/gesture/shake control, cursor is controlled or the like.In some simple touch-screen computing equipments (like navigational system), there is not this cursor; But the user can select focus through touching focus simply.
Size and the safety grades that can adjust target are inversely proportional to.In case confirm, pointer disappears, and activates sightless target.Auxiliary layer occurs now and covers basic layer.Clixel uses 2 layers, and wherein x and y cursor are controlled every layer position, perhaps touch-pull the auxiliary layer mode simply.Thereby in addition the more arrangement and the greater security of big figure, a plurality of (for example 3 or more) layer also is possible.
This auxiliary layer (can be top layer) can be transparent or translucent, but except the array with user's marker element of regular pattern or grid arrangement.These elements can be numeral, alphabetic word, color, shape, lines, icon or the like, or these any combination.(notice that the required lowest term of Clixel work is the cursor that is used for top layer.If nobody spies on, then have the higher-security grade in theory, but in fact this is relatively poor scheme, because copy too easily.)
When cursor/mouse moved, the whole grid array in the assistant images layer moved on static basic picture.In not having the touch panel device of cursor, the user then can pull on the touch-screen or knocking its finger so that grid moves on static basic picture simply.Can use modeling, the distance that the rapid change grid that makes touch knock moves based on physics.In having the computing equipment of accelerometer, can use and shake or the control of tilting; Little inclination can make grid be revealed as beginning and on primary image, slide.Grid repeats or circulation along all directions, makes it not have the edge.This means that selected element also repeats.
The task of establishment stage is but that the marker element of selecting in advance that exists in the top layer align with selected focus (or point of safes) in the basic layer, and common then click is to confirm.
Grid size is more little, and the element number in the second layer or the top layer is many more; Element number is many more, and security is high more, but the user is difficult to more fast and easily locatees designed element.Under the situation of clicking inconvenience (for example utilizing touch-screen), can use stop regularly as affirmation.Yet, need software and prevent " clearance "---enough come flyback retrace to start stop regularly lentamente.
This process of setting up can be directly carried out on the computing equipment of authentication mechanism needing, accomplish in case set up, then the user need be when visit computing equipment (or computing equipment provide specific function/access level) authentication himself.Therefore, for example, the user of PC or mobile phone can accomplish the above-mentioned process of setting up on this PC or mobile phone.In addition, the user can accomplish the above-mentioned process of setting up on a computing equipment, and this sets up process can be applied to a plurality of other equipment, so the user only accomplishes once and to set up, and he possibly need all computing equipments of visit to share identical verification process then.This is particularly suited for having the required authentication of organizing of a plurality of computing equipments, perhaps is suitable for cloud computing application, point of sale authentication (for example at cash dispenser or when using credit or debit card to buy) and replaces traditional die and PIN system.
When the user need to the computing equipment authentication himself the time (for example) as long as in more than the time of selecting in advance, do not use equipment, need the same case of traditional PI N or password input, equipment shows primary image.Can call the assistant images layer then.This can carry out in every way.For PC, in case any key or rolling mouse on the user touches key dish, the assistant images layer can occur automatically.For touch panel device, can call the assistant images layer to the single touch of screen.For handheld device (like mobile phone), short shake (or any aforementioned activities) and can call the assistant images layer.In case show the assistant images layer, the user must move the element in this assistant images layer, make that the element of selecting in advance in this assistant images layer fully aligns on the focus of selecting in advance.Because the element in the assistant images layer is formed the link grid of element, moves an element and cause every other element to move with predictable mode.Therefore; The element that the user need not select to select in advance also moves it; But can select any element (for example the user can place its cursor any position of assistant images layer or touch any position of assistant images layer simply); Then it is moved, the element of selecting in advance in the assistant images layer with basic layer in focus between fully align.But the observer who steals a glance at the user from behind will not know that which zone that the user is aliging in which element and the primary image is a target.
The display with wide X and high Y 118 of computing equipment 100 has been shown among Fig. 1.Show the position of the focus 101 and the element of selecting in advance 103 in the assistant images of the selection in advance in the primary image.When the element of selecting in advance in the assistant images fully alignd on the focus of selecting in advance, success identity (for example login attempt) took place.In the example of Fig. 1, have radius D, be that the circle at center is an authentication region 105 with focus 101, in authentication region 105, the positions of elements of selecting the in advance authentication of succeeding.In this example, D is for success identity (like login), from the ultimate range of focus to element position.E is the distance of the position of the element of selecting in advance 103 from focus 101 to assistant images.Because greater than distance B, authentication in this example is unsuccessful apart from E.
In Fig. 1, authentication is unsuccessful because in the top layer selected element with basic layer in focus or point of safes between align accurate inadequately.Note, can change authentication region 105 through revising the D value.This has changed the number percent that trial is succeeded and logined in the overall screen area (X*Y).If D is less, then will align with focus 101 so that successfully login more accurately in the position of the element in the assistant images 103.If D is bigger, then align with focus 101 so that successfully login on out of true ground relatively in the position of the element in the assistant images 103.In fact, the manufacturer of computing equipment will set up for the optimized parameter value of given screen resolution with size and given cursor mechanism through meticulous test.The ability of effective size (being distance B) in the zone of selecting to be associated with focus can also be provided to the user.
Fig. 2 shows successfully alignment, thus obtain authentication and obtain to computing equipment visit (if or equipment be point of sales terminal, then confirm to sell or the like).
Below check said method to 6 kinds of modes of criterion of failure password or PIN.
Repetition test or systemic repetition test at random: safety grades is that target area is divided by screen area.2mm target on the laptop computer screen provides approximately and 4 safety grades that the PIN number is identical.Bigger if desired security then can be clicked in proper order in utilization, uses two or more targets.Utilize two targets, because the area of two targets, the security of each grade reduces by half, but the probability of double-stage operation multiplies each other, and therefore in theory for the laptop computer example, security increases to 25,000, and 1/000th.The security of peeping behind will be on basic layer or on top layer and difference according to two targets.Yet two targets on the basic layer and a target on the top layer possibly be to use the fastest.Through following the tracks of moving between two clicks, can increase other security---can analyze vector/gesture/timing as signature.
Have a mind to conjecture: thus for example can confirm 100 zones of maybe focus and not having the local no focus of details to the analysis of basic picture.If 100 elements are arranged in the grid array, then security is 1/1000th.Yet,, in fact possibly exist far more than 100 target locations, because the user can be with the edge of something or the border between the object or the like as target because this is a simulation system.
Know password through supervision: if the people who peeps is from behind resisted in expectation, then Clixel can be suitable in this field more excellent.As stated, grid array is revealed as identical all the time, so anyone can see on point of fixity (the for example lower left corner) and the top layer on the basic layer and the relation between its immediate element, and repeats this action.But if grid array changes its layout when manifesting at every turn, then this action is inoperative.This change can be to the spacing of grid, grid towards or inclination, grid in the order, the shape of grid or the like of element, perhaps these any combination provides hundreds of potentially the variations of selecting at random on array.These changes will be designed to trickle, and be revealed as similar in order to avoid puzzled to the user.
---but the focus on the basic layer and marker element on the top layer---should be easier to memory, thereby have no reason relatively and will it be write owing to exist two simple personal entities to remember.Because two layers as prompting, have no chance to select wrong password to carry out the mistake login.Even the memorandum of writing also possibly carried to a certain degree uncertainty (i.e. " 55 with Anne the corners of the mouth ").In above-mentioned example, only know that for a moment safety grades being reduced to of these entities is about 1/100th, but still be effective obstacle.
Assault: use analog mouse/trace ball/touch-screen to enter password preventing to use Hacker Program, knock other this technology of getter or login details that can the intercepting user like keyboard.Although can follow the tracks of mouse really, since the generation at random of the numeral in the grid, the password that the track of tracking mouse can not drawn the user.
Through using combination from the sexadecimal information of two layers, further strengthened safety on line as authenticate key.Do not use the simple numerical set; Be pixel and the x of picture on the screen; Y coordinate (although this is a kind of selection really); This system can obtain the byte code sequence than hundred times of domestic consumer's password long numbers with the binary message and the basic picture layer merging that is used to appear picture from the top grid layer.Then, can use byte code sequence, rather than the set of letter or number, come to the server system authenticated.Therefore, because the length of sequence is compared with the password that domestic consumer imports, intercepting or assault are more much more difficult.
The information that is used to appear separating layer (for example top layer grid and bottom picture) can also reside at zones of different potentially; For example; Can protect and appear user's picture according to user's credit card or the information in the mobile phone, can be kept on the server system or produce by ATM and produce the required concrete element of particular grid to this user.There is not the project of the original image that comprises the user in this separation that produces the required key element of authenticate key at least through preventing that the third party from visiting two units simultaneously and usually having increased further safety grades.
Compelled open to the robber.Clixel provides through when logining, describing the chance that wrong alignment misleads the robber to the victim of bravery.Then, because at random grid changes, when attempting once more should operation the time with inoperative.
To the security of system and the factor of availability is the outward appearance of top layer array.But between easy selected marker element in location and element number, exist compromise.The requirement of random modification array has solved this compromise.Through being disposed in order numeral, find selected element (for example in the grid of 10 * 10 grids of 100 numbers of words, finding 55) more easily.This is applicable to the element with known order well, like numeral and alphabetical.
Another advantage of Clixel is and can cuts out with suitable different user or its preference by figure.For example, the top layer of child's Clixel can be made up of the selected works of painted shape.To be easy to find selected element in order making, for example, can to arrange two variablees (CF) horizontally and vertically, therefore, green triangle always is positioned at the point of crossing of green line and triangle line.Three variablees can provide similar hexagonal grid.For prevent the copy, the order of CF can change when manifesting at every turn, can change as stated spacing/towards/inclination or the like.
Having multiple basic tomographic image/target makes the user to have the multiple login that is easy to remember to different field---work/family, mobile phone, laptop computer, online bank, online transaction or the like of its life.These can all have identical top layer element, perhaps can have the different arrays of element when needed.Family's picture of checking the array that is coated with painted shape is the visual cues that should green triangle be alignd with the mouth of Anne.
In most scenes, can expect, if login attempt is rejected first, then allow to reattempt once at least.More easily, can use that the identical grid array of a position begins next trial in its setting, rather than new array is set at random.This will make the user who carries out target alignment carelessly operate sooner.If visit is rejected once more, then you will be locked.Equipment or service according to protection exist many different known ways to come override is carried out in locking.Can expect that locking for the first time is " soft ", makes some functions to continue, and provides suitable selection to user/burglar/hacker/person of searching and proofreaies and correct this situation.
A kind of mode that increases security is to have more logon screens, i.e. multipleization of described login process simply.Successfully afterwards through first logon screen (primary image/identifier to), present second screen (primary image/identifier to) to the user, by that analogy, up to realizing requisite number purpose login level.This is even more important when handling less screen, and the maximum security grade that wherein less screen size can be realized single logon screen (primary image/identifier to) has negative effect.
The multipleization permission of this logon screen is carried out the quick initial access single login primary image/identifier of unlocker device (for example be used for to) with the lower-security grade and is visited equipment and need the specific region of higher-security (bank, electronic mail access or the like) or in corporate environment, carry out to guarantee the specific region of abundant safety grades with higher safety grades.An example is following situation: only need single logon screen to come unlocker device and visit specific function (as calling out or browsing web), but pay or the visited company Email will need the user before being permitted visit through 3 logon screens.Multipleization of screen provides a kind of mechanism easily, to keep the flow process of login process, still expands safety grades through carrying out required more logon screens.The order that screen subsequent manifests can randomization.With reference to accompanying drawing 3 to Figure 10 realization is described.In order to set up Clixel, in Fig. 3, the user at first selects any personal images (being generally photo) as its primary image 301.This becomes user's desktop or main screen, and each user is through its name of input or opening device simply, when hoping to start working session or access system, and default this desktop or the main screen of manifesting.
Select focus 101 (being referred to as " point of safes "): through by the predetermined key on the lower keyboard, utilize the cursor of mouse or other indicating equipments to click button screen or through using touch-screen; User activation point of safes cursor 301 is shown in the default center among Fig. 4.
Prompting user its personal security of any choice of location on primary image 301 puts 101 position 401 now, under this situation is the eyes of Baima chess piece 501, and is as shown in Figure 5.
The size that can adjust point of safes cursor 401 is being fit to different screen resolutions, size and expecting that safety grades---the size of point of safes is more little, and it is safe more that method becomes.
Password is set: pointing out the user to select password now, is the single numeral between 1 to 64 under this situation, and in this was realized, password can be any type of alphanumeric sequence equally.Typical window has been shown among Fig. 6.Under this situation, user-selected number word 11.Screen is confirmed in this prompting, and is as shown in Figure 7.
User's register: when the user hoped login or authentication, the user can for example click the Clixel mark, and the point of safes selector switch appears as and covers on the primary image 301, and is as shown in Figure 8.In the implementation illustrated here, the point of safes selector switch is the repetitive sequence of grid 801, each grid comprise at random produce alphanumeric character---9 grids show the numeral between 1 to 64 with various sequences respectively here.The user can move to grid any part of primary image, and is so that the point of safes of being remembered 803 is alignd with selected password, as shown in Figure 9.When the user is aligned in 101 last times of point of safes with its selected password 803, the user is by input, if the location is correct, Clixel allows user's login, and is shown in figure 10.
The block diagram of the example of computing equipment 100 has been shown among Fig. 1, and in this example, computing equipment 100 is illustrated as portable electric appts.Computing equipment 100 comprises a plurality of assemblies, like the processor 102 of integrated operation of control computing equipment 100.Communication function comprises data and voice communication, carries out through communication subsystem 104, and communication subsystem 104 is communicated by letter with wireless network 150.Wireless network 150 can be the wireless network of any kind, includes but not limited to the network of data wireless networks, voice wireless network and support voice and data communication.Power supply 142 (like one or more rechargeable batteries or to the port of external power source) is to computing equipment 100 power supplies.
Processor 102 is mutual with other component interfaces; Like random-access memory (ram) 108, storer 110, display 118 (alternatively, can be the tectal touch-sensitive display of touch-sensitive that comprises operational coupled to electronic controller), one or more auxiliary I/O (I/O) subsystem 124 (comprising for example navigator), FPDP 126, loudspeaker 128, microphone 130 and other equipment subsystems 134 known in the art.Via processor 102 showing the information that can on computing equipment 100, show or appear on the display 118, like text, character, symbol, image, icon and sundry item.Processor 102 can be mutual with accelerometer 136, and accelerometer 136 can be used to detect gravity or the direction of the reacting force that caused by gravity.Can user totem information be stored in the storer 110.Computing equipment 100 comprises by processor 102 to be carried out and the operating system 146 and software program or assembly 148 of typical storage in permanent, renewable storer (like storer 110).Additional application or program can be loaded on computing equipment 100 through wireless network 150, auxiliary I/O subsystem 124, FPDP 126 or any other suitable subsystem 134.
Clixel is designed to a kind of individual's login or authentication method, is used to have any electronic equipment or the system of digital indicator, like personal computer, personal information manager, cell phone, ATM, security access system or the like.
Extend to ultimate system.Above-mentioned realization relates in setting up pattern, and the particular attention given point (or point of safes) in the user definition primary image will align with this specified point from the element-specific of assistant images layer then.When visiting subsequently or during authentication, the user must align this element with the particular attention given point.This method can extend to: at establishment stage, and the element of particular type in the definition primary image, this element does not have the fixed position in primary image.Will be from the element of the particular type of assistant images layer and the element alignment of the type in the primary image layer.For example, primary image can be the random arrangement of the little image of automobile.The user selects particular automobile at establishment stage.The assistant images layer can comprise the for example random arrangement of the little image of motorcycle.The user aligns specific motorcycle image with the automobile image of its selection.When needing authentication subsequently, as previous, manifest the primary image of automobile, and can call assistant images then.The user changes the grid of motorcycle image, till aliging between its automobile of selecting in advance and the motorcycle.Nature is suitable for the targeted customer basis, can use any selection of suitable images to fundamental sum assistant images layer.
For main Clixel example, can use in order to strengthen security more than two tomographic images.Therefore, for example, the user can select the specific image of automobile, motorcycle, woman's face at establishment stage, then when the needs authentication, illustrates and has the for example image layer of a plurality of faces, and this image layer is coated with the image of a plurality of automobiles; The user must carry out correct alignment, when correctly aliging, on a plurality of faces, manifests another image layer with motorcycle; When carrying out correct alignment, authentication is accomplished.The type of image must not manifest with set order, and the position of different faces in the layer or the like must be all not identical at every turn.Yet the zone that is associated with each image in the layer is with always the number percent of screen size must be enough little, so that the challenge of heavy attack is the same based on the system of PIN or password with tradition at least.But verification process will be enjoyed manyly for the user.
The mode that this method provides a kind of quickly and easily to use to the user, with to the computing equipment authentication himself.This method is more safer than many traditional Verification Systems based on password and PIN.This method can be used to use password, PIN and other simple authentication systems Anywhere, with log into thr computer, mobile phone or the like, online bank and transaction, ATM and chip and PIN credit and debit card safety or the like.This method can be used in the computing equipment of any kind with display, comprises personal computer, personal information manager, cell phone, ATM, point of sales terminal and security access system.
Through making observer's supervision be difficult to know that key provides improved security.Promoted the convenient and acceptance of using.Can utilize the figure password that is easy to remember to visit a plurality of distinct devices, like work/family's portable phone, laptop computer, online bank, online transaction or the like.
A kind of computing equipment comprises the pattern authentication interface; Said equipment shows primary image in the pattern authentication interface; The user for authentication himself, must will cover the element alignment of selection in advance in the element of selecting in advance that exists in the assistant images layer of primary image and the primary image.Selected element in the primary image can be the focus of fixed position in the primary image.The user can be through touching focus or utilizing cursor to select focus to identify the focus in the primary image.Focus can have the circle zone that is associated.The size of circle zone can be that the user selects.The software that moves on the computing equipment can be analyzed the applicability of picture as primary image.The assistant images layer can comprise the element that the user can identify, and said element is numeral, alphabetic word, color, shape, lines, icon or these any combination.The assistant images layer can be transparent, but except the array with user's marker element of pattern or grid arrangement.Pattern or grid can be regular.Can be so that whole pattern or grid move on static primary image, so that the user can correctly align.Can use modeling, the distance that rapid change pattern that feasible touch is knocked or grid move based on physics.Can use and shake or tilt to control the mode that pattern or grid move.Pattern or grid can repeat or circulation along all directions, make it not have the edge.The layout of pattern or grid can change when it manifests at every turn.Said change can to spacing, pattern or the grid of pattern or grid towards or inclination, pattern or grid in shape or these any combination of order, pattern or grid of element.Two or more focus in the primary image continuously can align.Identical element in the assistant images layer can be aligned to each in a plurality of focus in the primary image.Can use with primary image and assistant images layer in the combination of the sexadecimal information that is associated of the element of selecting in advance as authenticate key.Can use with primary image in the information that is associated of the element of selecting in advance and the information that is associated with the element of selecting in advance in the assistant images layer produce authenticate key; Every information is kept in the physically long-range equipment.Can cut out to be fit to different user or its preference the selection of the element in primary image and the assistant images layer.Manifest and after the user successfully alignd, another assistant images layer can manifest at an assistant images layer, the user is with the element alignment of selection in advance in the element of selecting in advance that exists in this another assistant images layer and the primary image.Can use three or more assistant images layers.The number of assistant images layer can change according to required safety grades.The element of selecting in advance in the primary image can be the element of following type: in primary image, do not have the fixed position, but can be apparent in any position in the primary image.Computing equipment can be each in following group: personal computer, personal information manager, cell phone, ATM, security access system, point of sales terminal.
Under the situation that does not break away from spirit of the present disclosure and inner characteristic, can realize the disclosure with other concrete forms.It only is schematic rather than restrictive that described embodiment should be considered in all respects.Therefore, the scope of the present disclosure is indicated by accompanying claims rather than foregoing description.Change in the implication of the equivalent of claim and the institute in the scope and should be included in its scope.

Claims (24)

1. computing equipment with pattern authentication interface, said equipment shows primary image in the pattern authentication interface, and authenticated during the element alignment of the selection in advance in the element of selecting in advance in the assistant images that covers primary image and the primary image.
2. computing equipment according to claim 1, wherein, the selected element in the primary image is the focus of fixed position in the primary image.
3. computing equipment according to claim 1 and 2, wherein, through touching or utilizing cursor to select to identify the focus in the primary image.
4. according to claim 2 or 3 described computing equipments, wherein, focus has the circle zone that is associated, and the size of circle zone is that the user selects.
According to before the described computing equipment of arbitrary claim, wherein, the software analysis picture that moves on the said computing equipment is as the applicability of primary image.
According to before the described computing equipment of arbitrary claim, wherein, assistant images comprises element, said element is numeral, alphabetic word, color, shape, lines, icon or its any combination.
According to before the described computing equipment of arbitrary claim, wherein, except the array with the element of pattern or grid arrangement, assistant images is transparent.
8. computing equipment according to claim 7, wherein, pattern or grid are regular.
9. according to claim 7 or 8 described computing equipments, wherein, pattern or grid move on static primary image, to realize alignment.
10. computing equipment according to claim 9 wherein, uses the modeling based on physics, the distance that rapid change pattern that feasible touch is knocked or grid move.
11., wherein, shake or mode that tilt control control pattern or grid move according to claim 9 or 10 described computing equipments.
12. according to each described computing equipment in the claim 7 to 11, wherein, pattern or grid repeat or circulation.
13. according to each described computing equipment in the claim 7 to 12, wherein, when each display pattern or grid, the layout of pattern or grid changes.
14. computing equipment according to claim 13, wherein, said change to spacing, pattern or the grid of pattern or grid towards or inclination, pattern or grid in shape or its any combination of order, pattern or grid of element.
15. according to before the described computing equipment of arbitrary claim, wherein, two or more focus in the primary image that aligns continuously.
16. computing equipment according to claim 15, wherein, the identical element in the assistant images is aligned to each in two or more focus in the primary image.
17. according to before the described computing equipment of arbitrary claim, wherein, be at least a portion of authenticate key with the combination of the information that is associated of element of selection in advance in primary image and the assistant images.
18. according to before the described computing equipment of arbitrary claim, wherein, use with primary image in the information that is associated of the element of selecting in advance and the information that is associated with the element of selection in advance in the assistant images layer produce authenticate key; Every information is kept in the physically long-range equipment.
19. according to before the described computing equipment of arbitrary claim, wherein, the selection of the element in primary image and the assistant images is cut out with suitable different user or its preference.
20. according to before the described computing equipment of arbitrary claim; Wherein, After an assistant images manifests and detects successfully alignment; Show another assistant images, obtain authentication according to element of selecting in advance in said another assistant images and the element alignment of selecting in advance in the primary image.
21. according to before the described computing equipment of arbitrary claim, wherein, use three or more assistant images layers.
22. computing equipment according to claim 20, wherein, the number of assistant images layer changes according to required safety grades.
23. according to before the described computing equipment of arbitrary claim, wherein, the element of selecting in advance in the primary image is the element of following type: in primary image, do not have the fixed position, but be apparent in any position in the primary image.
24. according to before the described computing equipment of arbitrary claim, comprise following each: personal computer, personal information manager, cell phone, ATM, security access system, point of sales terminal.
CN201080036589.0A 2009-06-18 2010-06-15 There is the computing equipment of pattern authentication interface Active CN102804196B (en)

Applications Claiming Priority (5)

Application Number Priority Date Filing Date Title
GBGB0910545.3A GB0910545D0 (en) 2009-06-18 2009-06-18 Picturesafe
GB0910545.3 2009-06-18
GB0912008.0A GB2471142B (en) 2009-06-18 2009-07-10 Computing device with graphical authentication interface
GB0912008.0 2009-07-10
PCT/GB2010/001172 WO2010146352A1 (en) 2009-06-18 2010-06-15 Computing device with graphical authentication interface

Publications (2)

Publication Number Publication Date
CN102804196A true CN102804196A (en) 2012-11-28
CN102804196B CN102804196B (en) 2016-05-11

Family

ID=40941048

Family Applications (2)

Application Number Title Priority Date Filing Date
CN201080036589.0A Active CN102804196B (en) 2009-06-18 2010-06-15 There is the computing equipment of pattern authentication interface
CN201080036587.1A Active CN102804195B (en) 2009-06-18 2010-06-15 Pattern authentication

Family Applications After (1)

Application Number Title Priority Date Filing Date
CN201080036587.1A Active CN102804195B (en) 2009-06-18 2010-06-15 Pattern authentication

Country Status (7)

Country Link
US (3) US9064104B2 (en)
EP (2) EP2443579A1 (en)
CN (2) CN102804196B (en)
CA (2) CA2766019C (en)
GB (2) GB0910545D0 (en)
TW (1) TWI557588B (en)
WO (2) WO2010146352A1 (en)

Families Citing this family (106)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AT413775B (en) * 2004-03-31 2006-05-15 Helmut Dipl Ing Schluderbacher PROCESS FOR SAFE REGISTRATION TO A TECHNICAL SYSTEM
US7953983B2 (en) 2005-03-08 2011-05-31 Microsoft Corporation Image or pictographic based computer login systems and methods
US8458485B2 (en) * 2009-06-17 2013-06-04 Microsoft Corporation Image-based unlock functionality on a computing device
GB0910545D0 (en) 2009-06-18 2009-07-29 Therefore Ltd Picturesafe
CN102279910A (en) * 2010-06-11 2011-12-14 鸿富锦精密工业(深圳)有限公司 Device with encryption and decryption functions and encrypting and decrypting methods of device
EP2405650A1 (en) * 2010-07-09 2012-01-11 Nagravision S.A. A method for secure transfer of messages
US8756672B1 (en) * 2010-10-25 2014-06-17 Wms Gaming, Inc. Authentication using multi-layered graphical passwords
US9135426B2 (en) 2010-12-16 2015-09-15 Blackberry Limited Password entry using moving images
US8631487B2 (en) * 2010-12-16 2014-01-14 Research In Motion Limited Simple algebraic and multi-layer passwords
US8661530B2 (en) 2010-12-16 2014-02-25 Blackberry Limited Multi-layer orientation-changing password
US8931083B2 (en) 2010-12-16 2015-01-06 Blackberry Limited Multi-layer multi-point or randomized passwords
US8769641B2 (en) 2010-12-16 2014-07-01 Blackberry Limited Multi-layer multi-point or pathway-based passwords
US8635676B2 (en) 2010-12-16 2014-01-21 Blackberry Limited Visual or touchscreen password entry
US9258123B2 (en) 2010-12-16 2016-02-09 Blackberry Limited Multi-layered color-sensitive passwords
US8650635B2 (en) 2010-12-16 2014-02-11 Blackberry Limited Pressure sensitive multi-layer passwords
US8745694B2 (en) 2010-12-16 2014-06-03 Research In Motion Limited Adjusting the position of an endpoint reference for increasing security during device log-on
US8650624B2 (en) 2010-12-16 2014-02-11 Blackberry Limited Obscuring visual login
US8863271B2 (en) 2010-12-16 2014-10-14 Blackberry Limited Password entry using 3D image with spatial alignment
US9152779B2 (en) * 2011-01-16 2015-10-06 Michael Stephen Fiske Protecting codes, keys and user credentials with identity and patterns
CN102609659A (en) * 2011-01-21 2012-07-25 鸿富锦精密工业(深圳)有限公司 Password authentication method
US10089606B2 (en) 2011-02-11 2018-10-02 Bytemark, Inc. System and method for trusted mobile device payment
US20120296826A1 (en) 2011-05-18 2012-11-22 Bytemark, Inc. Method and system for distributing electronic tickets with visual display
US10360567B2 (en) 2011-03-11 2019-07-23 Bytemark, Inc. Method and system for distributing electronic tickets with data integrity checking
US8494967B2 (en) 2011-03-11 2013-07-23 Bytemark, Inc. Method and system for distributing electronic tickets with visual display
US10453067B2 (en) 2011-03-11 2019-10-22 Bytemark, Inc. Short range wireless translation methods and systems for hands-free fare validation
US10762733B2 (en) 2013-09-26 2020-09-01 Bytemark, Inc. Method and system for electronic ticket validation using proximity detection
US9514297B2 (en) * 2011-03-28 2016-12-06 Htc Corporation Systems and methods for gesture lock obfuscation
US8769668B2 (en) * 2011-05-09 2014-07-01 Blackberry Limited Touchscreen password entry
EP2523137B1 (en) * 2011-05-09 2017-01-04 BlackBerry Limited Touchscreen password entry
CN102779256A (en) * 2011-05-13 2012-11-14 纬创资通股份有限公司 Method for inputting password and electronic device
AU2011202415B1 (en) * 2011-05-24 2012-04-12 Microsoft Technology Licensing, Llc Picture gesture authentication
US10078755B2 (en) 2011-05-27 2018-09-18 Apple Inc. Private and public applications
JP5143258B2 (en) * 2011-06-17 2013-02-13 株式会社東芝 Information processing apparatus, information processing method, and control program
US20130097697A1 (en) * 2011-10-14 2013-04-18 Microsoft Corporation Security Primitives Employing Hard Artificial Intelligence Problems
US9164603B2 (en) 2011-10-28 2015-10-20 Atmel Corporation Executing gestures with active stylus
US9223948B2 (en) 2011-11-01 2015-12-29 Blackberry Limited Combined passcode and activity launch modifier
KR101841039B1 (en) * 2011-11-28 2018-03-28 삼성전자주식회사 Method for authenticating password and Portable Device thereof
US8782776B2 (en) * 2012-01-04 2014-07-15 Dell Products L.P. Photo combination lock
US9633186B2 (en) * 2012-04-23 2017-04-25 Apple Inc. Systems and methods for controlling output of content based on human recognition data detection
US9690929B2 (en) * 2012-05-22 2017-06-27 Telefonaktiebolaget Lm Ericsson (Publ) Method, apparatus and computer program product for determining password strength
JP5502943B2 (en) * 2012-06-29 2014-05-28 楽天株式会社 Information processing apparatus, authentication apparatus, information processing method, and information processing program
US11037147B2 (en) * 2012-07-09 2021-06-15 The Western Union Company Money transfer fraud prevention methods and systems
US8903163B2 (en) * 2012-08-09 2014-12-02 Trimble Navigation Limited Using gravity measurements within a photogrammetric adjustment
US9397992B1 (en) * 2013-10-23 2016-07-19 Emc Corporation Authentication using color-shape pairings
US9430634B1 (en) 2012-10-23 2016-08-30 Emc Corporation Authentication using gesture passwords
KR101495591B1 (en) * 2013-10-08 2015-02-25 원투씨엠 주식회사 Method for Authenticating Capacitive Touch
CN103034794A (en) * 2012-12-14 2013-04-10 上海华勤通讯技术有限公司 User authentication method of electronic device
US20140210703A1 (en) * 2013-01-31 2014-07-31 Samsung Electronics Co. Ltd. Method of unlocking and subsequent application launch in portable electronic device via orientation sensing
US10754936B1 (en) * 2013-03-13 2020-08-25 United Services Automobile Associate (USAA) Behavioral profiling method and system to authenticate a user
US20140282979A1 (en) * 2013-03-15 2014-09-18 Charles A. Andon User authentication systems for remote computers, internet applications and online services
US9813411B2 (en) 2013-04-05 2017-11-07 Antique Books, Inc. Method and system of providing a picture password proof of knowledge as a web service
US9419795B2 (en) * 2013-04-24 2016-08-16 Intellectual Discovery Co., Ltd. Digital device and method for performing secure communication using same
US9331985B2 (en) * 2013-04-24 2016-05-03 Intellectual Discovery Co., Ltd. Portable device, a stationary device, a digital device and a method for performing secure communication using thereof
US9721175B2 (en) 2013-05-08 2017-08-01 Jpmorgan Chase Bank, N.A. Systems and methods for high fidelity multi-modal out-of-band biometric authentication through vector-based multi-profile storage
US10235508B2 (en) 2013-05-08 2019-03-19 Jpmorgan Chase Bank, N.A. Systems and methods for high fidelity multi-modal out-of-band biometric authentication with human cross-checking
US9760785B2 (en) 2013-05-08 2017-09-12 Jpmorgan Chase Bank, N.A. Systems and methods for high fidelity multi-modal out-of-band biometric authentication
AU2014203047B2 (en) * 2013-06-04 2019-01-24 Nowww.Us Pty Ltd A Login Process for Mobile Phones, Tablets and Other Types of Touch Screen Devices or Computers
EP3016013A4 (en) * 2013-06-25 2016-10-26 Fujitsu Ltd Information processing device, terminal device, information processing program, and information processing method
CZ309308B6 (en) * 2013-07-12 2022-08-17 Aducid S.R.O. A method of entering classified information into electronic digital devices
EP3022675B1 (en) * 2013-07-16 2019-05-22 Nokia Technologies OY Methods, apparatuses, and computer program products for hiding access to information in an image
US9923855B2 (en) 2013-08-01 2018-03-20 Jpmorgan Chase Bank, N.A. Systems and methods for electronic message prioritization
US9892576B2 (en) 2013-08-02 2018-02-13 Jpmorgan Chase Bank, N.A. Biometrics identification module and personal wearable electronics network based authentication and transaction processing
WO2015164476A2 (en) * 2014-04-22 2015-10-29 Antique Books, Inc. Method and system of providing a picture password for relatively smaller displays
US9323435B2 (en) 2014-04-22 2016-04-26 Robert H. Thibadeau, SR. Method and system of providing a picture password for relatively smaller displays
US9692879B1 (en) 2014-05-20 2017-06-27 Invincea, Inc. Methods and devices for secure authentication to a compute device
US9490981B2 (en) 2014-06-02 2016-11-08 Robert H. Thibadeau, SR. Antialiasing for picture passwords and other touch displays
US20150350210A1 (en) 2014-06-02 2015-12-03 Antique Books Inc. Advanced proofs of knowledge for the web
WO2016007192A1 (en) 2014-07-10 2016-01-14 Ge Intelligent Platforms, Inc. Apparatus and method for electronic labeling of electronic equipment
US10204530B1 (en) * 2014-07-11 2019-02-12 Shape Matrix Geometric Instruments, LLC Shape-matrix geometric instrument
US9497186B2 (en) 2014-08-11 2016-11-15 Antique Books, Inc. Methods and systems for securing proofs of knowledge for privacy
US9361447B1 (en) 2014-09-04 2016-06-07 Emc Corporation Authentication based on user-selected image overlay effects
SE538349C3 (en) * 2014-09-30 2016-06-28 Tokon Security Ab Method for authentication using an electronic device
US9460279B2 (en) 2014-11-12 2016-10-04 International Business Machines Corporation Variable image presentation for authenticating a user
US10050784B2 (en) * 2014-11-13 2018-08-14 Secure Channels Inc. System and method for generating a cryptographic key
EP3038001A1 (en) * 2014-12-23 2016-06-29 Orange Method for getting a user validation of a key
US9852280B2 (en) * 2015-01-08 2017-12-26 Blackberry Limited Authentication for access to a device that has a primary display portion and a secondary display portion
US9576123B2 (en) * 2015-03-27 2017-02-21 Ca, Inc. Pattern-based password with dynamic shape overlay
US11265165B2 (en) 2015-05-22 2022-03-01 Antique Books, Inc. Initial provisioning through shared proofs of knowledge and crowdsourced identification
US9569606B2 (en) * 2015-06-08 2017-02-14 International Business Machines Corporation Verification of a pattern based passcode
US10198963B2 (en) 2015-06-18 2019-02-05 Googale (2009) Ltd. Secure computerized system, method and computer program product for children and/or pre-literate/illiterate users
US10853029B2 (en) 2015-06-18 2020-12-01 Googale (2009) Ltd. Computerized system including rules for a rendering system accessible to non-literate users via a touch screen
WO2016203474A1 (en) * 2015-06-18 2016-12-22 Googale (2009) Ltd Secured computerized system for children and/or pre- literate/ illiterate users
US9871798B2 (en) 2015-06-18 2018-01-16 Googale (2009) Ltd. Computerized system facilitating secured electronic communication between and with children
US10565569B2 (en) 2015-07-30 2020-02-18 NXT-ID, Inc. Methods and systems related to multi-factor, multidimensional, mathematical, hidden and motion security pins
US11803784B2 (en) 2015-08-17 2023-10-31 Siemens Mobility, Inc. Sensor fusion for transit applications
WO2017030799A1 (en) 2015-08-17 2017-02-23 Bytemark, Inc. Short range wireless translation methods and systems for hands-free fare validation
KR102443545B1 (en) 2015-10-27 2022-09-15 삼성전자주식회사 Electronic apparatus and method for executing application or service
US10061913B2 (en) 2016-02-29 2018-08-28 Blackberry Limited Slider authenticator
US10845987B2 (en) * 2016-05-03 2020-11-24 Intelligent Platforms, Llc System and method of using touch interaction based on location of touch on a touch screen
US11079915B2 (en) 2016-05-03 2021-08-03 Intelligent Platforms, Llc System and method of using multiple touch inputs for controller interaction in industrial control systems
US9697348B1 (en) * 2016-10-24 2017-07-04 International Business Machines Corporation Location specific image based authentication
US10586220B2 (en) * 2016-12-02 2020-03-10 Bank Of America Corporation Augmented reality dynamic authentication
KR101885836B1 (en) * 2016-12-07 2018-09-11 이수현 Method of Providing User Certification and Additional Service Using Image Password System
US10642966B2 (en) 2017-11-30 2020-05-05 International Business Machines Corporation Passwords defined using sequences of images
CN107908936A (en) * 2017-12-25 2018-04-13 朱小菊 Electronic cipher input system
EP3518130A1 (en) 2018-01-30 2019-07-31 OneVisage SA Method and system for 3d graphical authentication on electronic devices
CN111126146B (en) * 2018-04-12 2024-03-05 Oppo广东移动通信有限公司 Image processing method, image processing device, computer readable storage medium and electronic apparatus
US20190361847A1 (en) * 2018-05-23 2019-11-28 Stephen C. Thomson Spatial Linking Visual Navigation System and Method of Using the Same
US10885177B2 (en) 2018-11-15 2021-01-05 Hcl Technologies Limited System and method for authentication of a user logging into an IT enabled application
US11620557B2 (en) 2019-03-07 2023-04-04 Throughputer, Inc. Online trained object property estimator
US11561983B2 (en) 2019-03-07 2023-01-24 Throughputer, Inc. Online trained object property estimator
US11604867B2 (en) 2019-04-01 2023-03-14 Throughputer, Inc. Graphic pattern-based authentication with adjustable challenge level
JP6562492B1 (en) * 2019-05-16 2019-08-21 株式会社モルフォ Image processing apparatus, image processing method, and program
EP3980910A4 (en) 2019-06-05 2023-07-26 Throughputer, Inc. Graphic pattern-based passcode generation and authentication
US11921830B2 (en) * 2019-07-25 2024-03-05 Seaton Gras System and method for verifying unique user identification
US11455386B2 (en) * 2019-10-07 2022-09-27 International Business Machines Corporation Authentication based on image classification

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0901060A2 (en) * 1997-09-05 1999-03-10 Fujitsu Limited Secure data control apparatus and method
EP1422589A1 (en) * 2001-07-27 2004-05-26 Avimir, LLC Method and device for entering a computer database password
US20080060052A1 (en) * 2003-09-25 2008-03-06 Jay-Yeob Hwang Method Of Safe Certification Service
CN101282217A (en) * 2007-04-05 2008-10-08 华为技术有限公司 Method, apparatus and system for protecting biological attribute data
WO2008124708A2 (en) * 2007-04-10 2008-10-16 Thomas Joseph Tomeny Identification and authentication using public templates and private patterns
WO2009022242A1 (en) * 2007-08-13 2009-02-19 Sony Ericsson Mobile Communications Ab Graphical image authentication
CN102804195A (en) * 2009-06-18 2012-11-28 捷讯研究有限公司 Graphical authentication

Family Cites Families (87)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5638501A (en) * 1993-05-10 1997-06-10 Apple Computer, Inc. Method and apparatus for displaying an overlay image
TW299410B (en) * 1994-04-04 1997-03-01 At & T Corp
US5821933A (en) * 1995-09-14 1998-10-13 International Business Machines Corporation Visual access to restricted functions represented on a graphical user interface
US5699514A (en) 1995-12-26 1997-12-16 Lucent Technologies Inc. Access control system with lockout
US6209104B1 (en) * 1996-12-10 2001-03-27 Reza Jalili Secure data entry and visual authentication system and method
ES2264203T3 (en) 1997-05-13 2006-12-16 Passlogix, Inc. GENERALIZED USER IDENTIFICATION AND AUTHENTICATION SYSTEM.
US6686931B1 (en) 1997-06-13 2004-02-03 Motorola, Inc. Graphical password methodology for a microprocessor device accepting non-alphanumeric user input
JP3651209B2 (en) * 1997-10-23 2005-05-25 カシオ計算機株式会社 Verification device and recording medium
US7219368B2 (en) * 1999-02-11 2007-05-15 Rsa Security Inc. Robust visual passwords
JP2001092785A (en) 1999-09-20 2001-04-06 Sanyo Electric Co Ltd Password authentication device and password authenticating method
US6950949B1 (en) * 1999-10-08 2005-09-27 Entrust Limited Method and apparatus for password entry using dynamic interface legitimacy information
WO2001099338A1 (en) * 2000-06-03 2001-12-27 Threewin.Com Co., Ltd. Method and apparatus for inputting secret information
AU5575100A (en) * 2000-06-03 2002-01-02 Threewin.Com Co., Ltd. Method and apparatus for inputting secret information using multiple screen pointers
US6687390B2 (en) * 2001-12-04 2004-02-03 Applied Neural Conputing Ltd. System for and method of web signature recognition system based on object map
JP2003288071A (en) * 2002-03-28 2003-10-10 Fujitsu Ltd Image processor and semiconductor device
FI20021655A (en) * 2002-06-19 2003-12-20 Nokia Corp Method of deactivating locking and a portable electronic device
US7243239B2 (en) * 2002-06-28 2007-07-10 Microsoft Corporation Click passwords
US7061503B2 (en) 2002-07-01 2006-06-13 Canon Kabushiki Kaisha In-gamut color picker
US7656393B2 (en) * 2005-03-04 2010-02-02 Apple Inc. Electronic device having display and surrounding touch sensitive bezel for user interface and control
JP2004040445A (en) * 2002-07-03 2004-02-05 Sharp Corp Portable equipment having 3d display function and 3d transformation program
KR20040005505A (en) 2002-07-10 2004-01-16 삼성전자주식회사 Computer system and method for controlling booting thereof
KR20020077838A (en) * 2002-08-09 2002-10-14 박승배 Password system solving the controversial point of the password-exposure by the observation of other people
US7124433B2 (en) 2002-12-10 2006-10-17 International Business Machines Corporation Password that associates screen position information with sequentially entered characters
FI20030920A0 (en) 2003-06-19 2003-06-19 Nokia Corp A method and system for generating a graphical password and a terminal
JP4345426B2 (en) * 2003-10-07 2009-10-14 ソニー株式会社 Image collation method, program, and image collation apparatus
US20050201638A1 (en) * 2004-03-12 2005-09-15 Hanbyn Cha Method and system for measuring an object in digital image
US7296233B2 (en) * 2004-05-10 2007-11-13 Microsoft Corporation Spy-resistant keyboard
KR100743854B1 (en) * 2004-05-31 2007-08-03 박승배 A method for preventing input information from exposing to observers
NO20050051D0 (en) 2005-01-05 2005-01-05 Lumex As Authentication information method and system fed into computer systems
US7953983B2 (en) * 2005-03-08 2011-05-31 Microsoft Corporation Image or pictographic based computer login systems and methods
US20060206919A1 (en) 2005-03-10 2006-09-14 Axalto Sa System and method of secure login on insecure systems
TWI268690B (en) 2005-04-11 2006-12-11 Wen-Xin Yang A method for verifying authorized access memorizing at least one position relative to identification background, the sequence and number of position by the user, wherein characters are generated randomly and different in logging-in the system
GB0521333D0 (en) * 2005-10-20 2005-11-30 Mitchell Alan J Method and apparatus for encrypting, obfuscating and reconstructing datasets or objects
US7657849B2 (en) * 2005-12-23 2010-02-02 Apple Inc. Unlocking a device by performing gestures on an unlock image
KR100884376B1 (en) * 2006-02-09 2009-02-17 (주)솔메이즈 Method and apparatus of OTP based on Challenge/Response
CN101421737B (en) 2006-03-01 2011-04-20 诺曼·弗兰克·格岑 Method and system for securing interface access via visual array paths in combination with hidden operators
WO2007110973A1 (en) * 2006-03-29 2007-10-04 The Bank Of Tokyo-Mitsubishi Ufj, Ltd. Person oneself authenticating system and person oneself authenticating method
EP1845474B1 (en) 2006-04-12 2009-09-23 Vince Yang A method for verifying authorized access
US8117458B2 (en) * 2006-05-24 2012-02-14 Vidoop Llc Methods and systems for graphical image authentication
EP2020114A4 (en) 2006-05-24 2014-01-22 Vidoop L L C Graphical image authentication and security system
US8732477B2 (en) 2006-05-24 2014-05-20 Confident Technologies, Inc. Graphical image authentication and security system
US20070277224A1 (en) * 2006-05-24 2007-11-29 Osborn Steven L Methods and Systems for Graphical Image Authentication
EP1879127A1 (en) 2006-07-13 2008-01-16 Cipherstone Technologies AB User authentication method and system and password management system
US8601538B2 (en) 2006-08-22 2013-12-03 Fuji Xerox Co., Ltd. Motion and interaction based CAPTCHA
US8452978B2 (en) * 2006-09-15 2013-05-28 Identity Metrics, LLC System and method for user authentication and dynamic usability of touch-screen devices
WO2008048579A2 (en) * 2006-10-13 2008-04-24 University Of Idaho Method for generating and using composite scene passcodes
US8353764B2 (en) * 2006-11-14 2013-01-15 Igt Behavioral biometrics for authentication in computing environments
US8519964B2 (en) * 2007-01-07 2013-08-27 Apple Inc. Portable multifunction device, method, and graphical user interface supporting user navigations of graphical objects on a touch screen display
US8176332B2 (en) * 2007-02-15 2012-05-08 Christopher Nathan Drake Computer security using visual authentication
US20080209223A1 (en) * 2007-02-27 2008-08-28 Ebay Inc. Transactional visual challenge image for user verification
DE102007016408A1 (en) 2007-03-26 2008-10-02 Ident Technology Ag Mobile communication device and input device therefor
WO2008132724A1 (en) 2007-04-26 2008-11-06 Mantisvision Ltd. A method and apparatus for three dimensional interaction with autosteroscopic displays
US20090012880A1 (en) * 2007-06-13 2009-01-08 Lucio Tortola User Interface For Creating and Displaying Digital Signage
US20090037986A1 (en) 2007-07-24 2009-02-05 Next Access Technologies, Llc Non-disclosing password entry method
US20090038006A1 (en) 2007-08-02 2009-02-05 Traenkenschuh John L User authentication with image password
US20100043062A1 (en) * 2007-09-17 2010-02-18 Samuel Wayne Alexander Methods and Systems for Management of Image-Based Password Accounts
US8352598B2 (en) * 2007-11-27 2013-01-08 Inha-Industry Partnership Institute Method of providing completely automated public turing test to tell computer and human apart based on image
CN101464741B (en) 2007-12-19 2011-12-07 联想(北京)有限公司 Touch panel and its use method and notebook computer with the same
KR100933679B1 (en) * 2007-12-28 2009-12-23 성균관대학교산학협력단 Graphic password input device and method of embedded system using wheel interface
JP5400301B2 (en) * 2008-01-23 2014-01-29 インターナショナル・ビジネス・マシーンズ・コーポレーション Authentication server device, authentication method, and authentication program
JP5238297B2 (en) * 2008-03-04 2013-07-17 シャープ株式会社 Authentication method and input device
JP5031641B2 (en) * 2008-03-31 2012-09-19 富士通株式会社 Pattern alignment method, verification method, and verification device
EP2304545A4 (en) 2008-06-12 2012-07-11 Ads Captcha Ltd A time-resolved&user-spatially-activated feedback entrance and method thereof
US8683582B2 (en) * 2008-06-16 2014-03-25 Qualcomm Incorporated Method and system for graphical passcode security
US8640227B2 (en) * 2008-06-23 2014-01-28 EchoStar Technologies, L.L.C. Apparatus and methods for dynamic pictorial image authentication
US8726355B2 (en) 2008-06-24 2014-05-13 Gary Stephen Shuster Identity verification via selection of sensible output from recorded digital data
US20100040293A1 (en) 2008-08-12 2010-02-18 International Business Machines Corporation Kinematic Based Authentication
US8055905B2 (en) 2008-08-19 2011-11-08 International Business Machines Corporation Graphical password authentication based on pixel differences
US8086745B2 (en) * 2008-08-29 2011-12-27 Fuji Xerox Co., Ltd Graphical system and method for user authentication
KR101505682B1 (en) * 2008-09-11 2015-03-24 엘지전자 주식회사 Mobile Terminal, Restricting System and Method of opening Information using the Mobile Terminal
US20100107067A1 (en) * 2008-10-27 2010-04-29 Nokia Corporation Input on touch based user interfaces
US8159327B2 (en) * 2008-11-13 2012-04-17 Visa International Service Association Device including authentication glyph
US7659869B1 (en) 2008-11-21 2010-02-09 Inernational Business Machines Corporation System and method for authenticating an end user
US8347103B2 (en) * 2009-01-13 2013-01-01 Nic, Inc. System and method for authenticating a user using a graphical password
AU2010221722A1 (en) 2009-02-06 2011-08-18 Oculis Labs, Inc. Video-based privacy supporting system
US20100287382A1 (en) * 2009-05-07 2010-11-11 John Charles Gyorffy Two-factor graphical password for text password and encryption key generation
EP2254071A1 (en) 2009-05-20 2010-11-24 Thomson Licensing Semantic graphical password system
US8458485B2 (en) * 2009-06-17 2013-06-04 Microsoft Corporation Image-based unlock functionality on a computing device
US8799668B2 (en) * 2009-11-23 2014-08-05 Fred Cheng Rubbing encryption algorithm and security attack safe OTP token
US8483518B2 (en) 2010-02-19 2013-07-09 Microsoft Corporation Image-based CAPTCHA exploiting context in object recognition
US8863271B2 (en) 2010-12-16 2014-10-14 Blackberry Limited Password entry using 3D image with spatial alignment
US8661530B2 (en) 2010-12-16 2014-02-25 Blackberry Limited Multi-layer orientation-changing password
US8631487B2 (en) * 2010-12-16 2014-01-14 Research In Motion Limited Simple algebraic and multi-layer passwords
US8769641B2 (en) * 2010-12-16 2014-07-01 Blackberry Limited Multi-layer multi-point or pathway-based passwords
US8931083B2 (en) * 2010-12-16 2015-01-06 Blackberry Limited Multi-layer multi-point or randomized passwords
US8650635B2 (en) 2010-12-16 2014-02-11 Blackberry Limited Pressure sensitive multi-layer passwords
US8769668B2 (en) * 2011-05-09 2014-07-01 Blackberry Limited Touchscreen password entry

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0901060A2 (en) * 1997-09-05 1999-03-10 Fujitsu Limited Secure data control apparatus and method
EP1422589A1 (en) * 2001-07-27 2004-05-26 Avimir, LLC Method and device for entering a computer database password
US20080060052A1 (en) * 2003-09-25 2008-03-06 Jay-Yeob Hwang Method Of Safe Certification Service
CN101282217A (en) * 2007-04-05 2008-10-08 华为技术有限公司 Method, apparatus and system for protecting biological attribute data
WO2008124708A2 (en) * 2007-04-10 2008-10-16 Thomas Joseph Tomeny Identification and authentication using public templates and private patterns
WO2009022242A1 (en) * 2007-08-13 2009-02-19 Sony Ericsson Mobile Communications Ab Graphical image authentication
CN102804195A (en) * 2009-06-18 2012-11-28 捷讯研究有限公司 Graphical authentication

Also Published As

Publication number Publication date
CN102804196B (en) 2016-05-11
CN102804195B (en) 2016-08-03
US10325086B2 (en) 2019-06-18
TW201115383A (en) 2011-05-01
US20150248547A1 (en) 2015-09-03
GB0912008D0 (en) 2009-08-19
US20100322485A1 (en) 2010-12-23
WO2010146353A1 (en) 2010-12-23
US9064104B2 (en) 2015-06-23
CA2765922C (en) 2020-06-30
GB2471142A (en) 2010-12-22
WO2010146352A1 (en) 2010-12-23
EP2443579A1 (en) 2012-04-25
CA2766019C (en) 2019-02-12
CN102804195A (en) 2012-11-28
GB2471142B (en) 2012-10-17
CA2765922A1 (en) 2010-12-23
CA2766019A1 (en) 2010-12-23
GB0910545D0 (en) 2009-07-29
EP2443581A1 (en) 2012-04-25
TWI557588B (en) 2016-11-11
US10176315B2 (en) 2019-01-08
US20120167199A1 (en) 2012-06-28

Similar Documents

Publication Publication Date Title
CN102804196B (en) There is the computing equipment of pattern authentication interface
EP2763070B1 (en) Graphical user interface (GUI) that receives directional input to change face for receiving passcode
US9507928B2 (en) Preventing the discovery of access codes
US20110006996A1 (en) Private data entry
US11128613B2 (en) Authentication based on visual memory
US9430144B1 (en) Unlocking electronic devices with touchscreen input gestures
JP2005535990A (en) Method and system for processing passwords entered by cell matching
JP2014512041A (en) System and method for secure data entry fields
US8869261B1 (en) Securing access to touch-screen devices
JP5634566B1 (en) Password input method, input terminal, and input system for touch panel terminal
US20140282973A1 (en) Systems and methods for securely transferring authentication information between a user and an electronic resource
US20120036573A1 (en) Drag-and-Tag Authentication
JP5651742B1 (en) Password input method, input terminal, and input system
KR101267229B1 (en) Method and system for authenticating using input pattern
US20170154173A1 (en) Array password authentication system and method thereof
Rajavat et al. Textual and graphical password authentication scheme resistant to shoulder surfing
KR102325833B1 (en) User authentification method and system using graphic otp
WO2022001707A1 (en) Method and system for receiving a secure input, using a secure input means
US20140304834A1 (en) Personalized Secure Data Access Techniques
KR101153896B1 (en) System and method of providing for password input interface
Huzaif et al. Securing Social Media using Pair based Authentication

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: Voight, Ontario, Canada

Applicant after: Blackberry Ltd.

Address before: Voight, Ontario, Canada

Applicant before: Research In Motion Ltd.

COR Change of bibliographic data
C14 Grant of patent or utility model
GR01 Patent grant